OEI: Operation Execution Integrity for Embedded Devices

نویسندگان

  • Zhichuang Sun
  • Bo Feng
  • Long Lu
  • Somesh Jha
چکیده

We formulate a new security property, called “Operation Execution Integrity” or OEI, tailored for embedded devices. Inspired by the operation-oriented design of embedded programs and considering the limited hardware capabilities of embedded devices, OEI attestation enables selective and practical verification of both control-flow integrity and critical-variable integrity for an operation being executed. This attestation allows remote verifiers to detect control-flow hijacks as well as data-only attacks, including data-oriented programming, on an embedded device—a capability needed for securing IoT but unachievable using existing methods. We design and build a system, called OAT, to realize and evaluate the idea of OEI attestation on ARM-based baremetal devices. OAT features a highly efficient measurement collection mechanism, a control-flow measurement scheme designed for determinate verifiability, and a method for lightweight variable-integrity checking. When tested against real-world embedded programs on a development board, OAT incurred only a mild runtime overhead (2.7%).

منابع مشابه

Sponge-Based Control-Flow Protection for IoT Devices

Embedded devices in the Internet of Things (IoT) face a wide variety of security challenges. For example, software attackers perform code injection and code-reuse attacks on their remote interfaces, and physical access to IoT devices allows to tamper with code in memory, steal confidential Intellectual Property (IP), or mount fault attacks to manipulate a CPU’s control flow. In this work, we pr...

متن کامل

Maintaining Terminal Integrity and Context-Aware Reconfiguration

There is a need for terminal management mechanisms for high volume embedded devices. Current technology provides mechanisms for adaptation of software on embedded devices during their deployment. These mechanisms give the opportunity to adapt a device to the wishes of the consumer at a specific location or time. While being useful to the user, these mechanisms might also jeopardize the software...

متن کامل

Formal Mirror Models: an Approach to Just-in-Time Reasoning for Device Ecologies

Pervasive computing calls for new ways of thinking about software and new ways of applying software development techniques. In pervasive computing environments, users will need to interact with collections of devices surrounding them (such as the “system” of smart devices in a user’s home), which we metaphorically term device ecologies. A user can interact with these devices with embedded softw...

متن کامل

Mirror Models for Pervasive Computing: Just-in-Time Reasoning about Device Ecologies

In pervasive computing environments, users will need to interact with collections of devices surrounding them (such as the “system” of smart devices in a user’s home), which we metaphorically term device ecologies. A user can interact with these devices with embedded software and hardware, either directly via the device’s own interface, or automated through scripts executed by a central coordin...

متن کامل

Read It Twice! A Mass-Storage-Based TOCTTOU Attack

Consumer electronics and embedded devices often allow the installation of applications and firmware upgrades from user-provided mass-storage devices. To protect the integrity of these devices and the associated electronic markets, the software packages are protected by cryptographic signatures. The software installation code assumes that files on attached mass-storage devices cannot change whil...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

متن کامل
عنوان ژورنال:
  • CoRR

دوره abs/1802.03462  شماره 

صفحات  -

تاریخ انتشار 2018